Cyber Security in Business Organizations - Case Study Example

Comments (0) Cite this document
With the incorporation of information technology into organizational operations, corporations have become vulnerable to a plethora of information security risks. Failure of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Cyber Security in Business Organizations
Read TextPreview

Extract of sample "Cyber Security in Business Organizations"

Download file to see previous pages Information security failures tip the balance and expose organizations to the aforementioned threats.
Organizations are challenged by the trend to ‘go global’ which implies that security programs should encompass the entire global market of a firm. In effect, this means that each individual unit of the firm dispersed globally should take responsibility for the security risks that are encountered. Despite having a strong central security infrastructure in place, ownership is an important issue that drives information security forward, especially in situations where the business critical applications lie outside the infrastructure (Johnson and Goetz, 2007).
Internal organizational factors are also critical to the information security challenge. Education and consultancy within the organization has become important to ensure that employees understand what they are asking for so that security professionals can better respond to the need of the situation. However, spreading awareness through consultancy is not an absolute solution. Many organizational members are resistant to change and change management is a subject executives are often concerned about. Facilitating a proactive work culture and involving line managers to take responsibility and auditors to enforce security can be pivotal. This can ensure compliance and help deal with information security issues by making internal employees accountable (Johnson and Goetz, 2007).
Protecting data and information in the midst of mobile technology has become an even greater challenge. The new age of smart phones has built a collaborative environment where protecting information security and intellectual property has become a great concern. Permissions are granted through a strong identity management system to access the information. However, a lot of it has to do with policy making and the enforceability of such policies. Compliance with information security standards is another challenge for many ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cyber Security in Business Organizations Case Study”, n.d.)
Cyber Security in Business Organizations Case Study. Retrieved from
(Cyber Security in Business Organizations Case Study)
Cyber Security in Business Organizations Case Study.
“Cyber Security in Business Organizations Case Study”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber Security in Business Organizations

Cyber Security

...confidentiality of message by using secured protocol links, and never save passwords or any other secreted information in plain alphabets. (J.D. Meier, A. Mackman, M. Dunner, S. Vasireddy, R. Escamilla and A. Murukan (Janaury 2006)) Anti Virus Software- an Antivirus software is made so that it can detect viruses and then prevent them from harming your operating system by fixing them. They are an all time countermeasure. (Conrad, E., Misenar, S., & Feldman, J. (2010)) You as an organization have to eschew these types of situations that are the reason you need to know about cyber safety and what to do to save yourself and your computers from these vulnerabilities. You have to find out how...
10 Pages(2500 words)Coursework

Cyber crime and security affair in e-business

...are outpacing growth and innovations in business technology. It is also a fact that protection of assets in cyber space is much more difficult, challenging and expensive than physical security. There is a need to re evaluate threat perception on the part of E Commerce based organizations and individuals. Contrary to common perception cyber criminals are not young geeks but middle aged serious people. These people work in organized groups and make a lot of money while working in organized manner. Mostly the firms are attacked by insiders. The outside cyber attackers include people who work alone or with...
24 Pages(6000 words)Article

The issue of immigration is complicated in the United States, basically because many more people want to come to this country th

1 Pages(250 words)Essay

Cyber security

...? Cyber Security Organizational business mission and related security goals Intellectual property is a juridical concept that refers to creative formations of the mind that have exclusive rights. Owners of the creations are granted exclusive rights on intangible assets as stipulated in the intellectual property law on intangible creations such as music, works of art, inventions, designs, symbols and innovations. Examples of intellectual property rights include trademarks, copyrights, patents and industrial design rights. In the current international economy and business environment, companies hold their intellectual assets as their most valid assets, the...
4 Pages(1000 words)Coursework

Cyber security

...the confidentiality of the United States security and official data. The United States cannot try him since there is no international rule that considers his actions a crime. Additionally, national rules and laws of a single state cannot be applied to citizens of other countries. It is extremely essential that cyber security be considered a vital issue in a meeting of the United Nations. In the meeting, it is anticipated that the organization should declare cyber breaching and leaking a global crime, so that the trial of those culprits should be undertaken by the aggrieved countries, irrespective of the geographic boundaries. Additionally,...
2 Pages(500 words)Coursework

Cyber security

...that is not linked to a specific business corporation on purpose (Bandy, Money, & Worstell, Intrusion Detection FAQ: What is a honeypot? Why do I need one?, 2013). It is an admitted fact that the honeypots can be very helpful to business corporations that have considerable resources to maintain them. However, if an organization does not have a security expert to strictly keep an eye on a honeypot the organizations has, at finest, built a susceptible platform that is not checked regularly as well as at worst, a platform that can be occupied and employed by any hacker to attack other systems. Moreover, there is a possible legal responsibility inbuilt in...
1 Pages(250 words)Coursework

Cyber Security is used to denote cyber security. Effective cyber security employs coordinated efforts throughout the information system. Some of the major elements of cyber security include end-user education, application security, disaster recovery/ business continuity planning, network security and information security (Marshall, 85). World governments devote huge sums of their annual budgets towards enhancing cyber security with the United States in particular, since 2010 allocating over 13 million USD annually for the...
1 Pages(250 words)Essay

Cyber Security

...Cyber Security Cyber Security Today, business and personal operations depend on computers and technology. With the innovation of internet and high levels of computer programming, organizations are dependent on computer programs to make their operation smoother, less time-consuming and error free. Various services like banking and finance, personal investment, clothing stores or any other electronic or non-electronic products access consumer by simply logging on to the internet. US President Barack Obama in mentioned in a speech “Technology is reshaping every aspect of our lives, and protecting our digital infrastructure from cyber threats is one of our highest security priorities” (Martin, 2013). With the development of science... and...
10 Pages(2500 words)Term Paper

Cyber Security and Business

...that motivates and endorses incentives for organizations to adopt broadly needed sound security practices. Thus, offering support for research required to improve future national protection and articulating to organizational managers the need to invest in cyber security in order to improve the nation’s security because a secure nation is an ideal place to do business (Heiman 99). Effects on national security due to exceeding the minimum requirements The impact of cyber security regulation on national security due to exceeding minimum requirements...
6 Pages(1500 words)Term Paper

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Cyber Security in Business Organizations for FREE!

Contact Us